Chip-Seq Exercise

Total Page:16

File Type:pdf, Size:1020Kb

Chip-Seq Exercise March 2016 ChIP-Seq Exercise Dena Leshkowitz, Bioinformatics and Biological Computing Unit Introduction In this workshop we will learn how to analyse ChIP-Seq data. The data is taken from the article Dicken at al. Transcriptional reprogramming of CD11b+Esam(hi) dendritic cell identity and function by loss of Runx3. PLoS One. 2013 Oct 15;8(10). We will use two biological replicate ChIP-Seq experiments that were conducted for detection of Runx3-bound genomic regions using in-house anti Runx3 Ab and 30x106 positive CD11c MACS isolated (Miltenyi Biotec) and classical dendritic cells (DC). For further details please see the article. The BAM files we will be using were done with only a subset of the reads present in the study. General remark- the commands you need to type in the command line are in italic format. Instructions 1. Accessing the Wexac server Open the MobaXterm as in previous exercises and open the terminal icon (red arrow) 1 You now have the ability to write commands in Linux which run on the WEXAC cluster. 2. Learning Basic Unix/Linux commands In order to list the files and folders in your home directory (your current folder location), type: ls To get more information in this command type man ls The man command gives you information on the command of interest. To exit the manual, type q. For more commands, look at the supplementary section (#2). To get more information on the files type: ls –l To move to the output directory type: cd output 3. Loading modules to your environment With the help of the Environment Modules package it is possible to dynamically modify your environment on the wexac cluster in order to be able to run particular software packages. We will know load the modules we need for this exercise. Please type all the commands: module load MACS/2.0.10 module load bedtools/2.25.0 module load python/2.7.11 In order to see all the modules that were loaded to our environment type: module list You should see three modules, if you don’t please load the module that is missing or ask an instructor to help. You will not be able to perform the tasks listed below without these modules. 4. Run MACS command 2 For more details on the tool look at the site https://github.com/taoliu/MACS Typing the macs command with the –h will give an explanation on how to run this tool macs2 callpeak -h Following is the command to run macs on the first replicate (the sign ~ is a shortcut to your home directory) macs2 callpeak -t ~/results/IP1.bam -c ~/results/input1.bam -n macs2_input1_IP1 Question 1: How many files were created by macs2? Question 2: From the information written to the screen during the run, what is the predicted fragment size (d)? Within the outputs produced, one of the files gives us all the peaks detected in a text file, write the following to see the top lines in the file head macs2_input1_IP1_peaks.narrowPeak To find the number of peaks, count the number of lines in the macs2_input1_IP1_peaks.narrowPeak file using the command wc –l wc -l macs2_input1_IP1_peaks.narrowPeak Question 3: How many peaks were detected in replicate 1? Run macs2 analysis on the second replicate – macs2 callpeak -t ~/results/IP2.bam -c ~/results/input2.bam -n macs2_input2_IP2 Question 4: How many peaks were detected in the second replicate experiment? To find the amount of overlap between the two replicate peak files we will use the program intersectBed. This program comes from BEDtools suite For the program explanation first type – intersectBed -h Question 5: What does the option –wa do? 3 We will run intersectBed to find the peaks overlapping between the two files to wc -l in order to count the lines of overlapping peaks. intersectBed -wa -a macs2_input1_IP1_peaks.narrowPeak -b macs2_input2_IP2_peaks.narrowPeak | wc –l Question 6: What is the amount of overlap between the replicates? Question 7: What is the amount of overlap if we switch the order of the files (or the –a and –b)? For good reproducibility we expect to have greater than 50% overlap. 5. Analyse peaks using CEAS: Enrichment of Genome Features CEAS provides statistics on ChIP enrichment at important genome features such as specific chromosome, promoters, gene bodies, or exons, and infers genes most likely to be regulated by the binding factor. The narrowPeaks outputs we have do not comply with the BED format needed to run CEAS. Therefore, we will first make a new file that is BED format, by cutting the first five columns of the narrowPeak file using the following command: cut -f1-5 macs2_input1_IP1_peaks.narrowPeak > macs2_input1_IP1_peaks.bed ceas -b macs2_input1_IP1_peaks.bed --name=replicate1_ceas \ -g /shareDB/CEAS-DB/mm9.refGene In order to view the CEAS pdf output file look at the sftp pane in the mobaXterm (see picture below), you might need to check in the “Follow terminal folder” (red arrow) and if you still do not 4 see the output folder files, change the path (green arrow). Once you are in the right folder and can see the CEAS pdf file, double click on it in order to open it. Question 8: Does our transcription factor - Runx3 preferably bind to promoters? 6. Analyse Peaks using GREAT 5 Download the peak BED file using the download feature of the sftp (see black arrow). Create a folder in disk D and save it to this folder. Open GREAT and upload the BED file. You should select the mm9 mouse built and click submit. Without going to deep into the researched biological question, the DC are involved in immune reactions. Question 9: How many times is the word immune found in the enriched terms? How many peaks and how many genes are associated with the first immune term in the output? 6 Question 10: Looking at the Region-Gene Association Graphs – what is the most frequent binned distance from the peak to TSS? We can view the genes associated with the peaks if we expand the Jobs Description (top of the report; press on the +) Select - View all genomic region-gene associations. The Following window will open - For the next assignment select a gene which has a peak next to it. 7. Browsing the peaks with a genome browser We will use the Integrative genomics browser - IGV to view the mapped reads and the peaks. Open the VNC session and open the IGV tool by double clicking on the IGV icon on the VNC monitor (see red arrow below). 7 Once the application opened load the mm9 genome. Select from File -> “Load from File” (see red arrow below) and select the BAM files from results directory (ending with bam ) and the bed files from output directory to your folder on D and load them to IGV as described below. After loading the bam files you can insert the name of the gene you selected from GREAT and write it in the window where there is a red arrow in the picture below. 8 Question 11: Where is the peak in regards to the gene (near TSS, upstream…)? Are you convinced that there is enrichment in binding at this location when considering the reads in both the IP experiments as well as in the controls? Are there other peaks near this genes – you can zoom out by clicking on the minus sign in the left corner (see blue arrow). Supplementary 1. Basic Linux commands: man (command) ...... shows help on a specific command ls ................. show directory, in alphabetical order logout ............. logs off system mkdir .............. make a directory rmdir .............. remove directory (rm -r to delete folders with files) rm ................. remove files cd ................. change current directory more .............. views a file, pausing every screenful grep ............... search for a string in a file head ............... show the first few lines of a file tail ............... show the last few lines of a file df ................. shows disk space available on the system du ................. shows how much disk space is being used up by folders chmod .............. changes permissions on a file cut ............... print selected parts of lines cp ............... copy file mv ............... move file wc –l .............. print the number of lines sort ............. sort lines of text files 9 .
Recommended publications
  • State Notation Language and Sequencer Users' Guide
    State Notation Language and Sequencer Users’ Guide Release 2.0.99 William Lupton ([email protected]) Benjamin Franksen ([email protected]) June 16, 2010 CONTENTS 1 Introduction 3 1.1 About.................................................3 1.2 Acknowledgements.........................................3 1.3 Copyright...............................................3 1.4 Note on Versions...........................................4 1.5 Notes on Release 2.1.........................................4 1.6 Notes on Releases 2.0.0 to 2.0.12..................................7 1.7 Notes on Release 2.0.........................................9 1.8 Notes on Release 1.9......................................... 12 2 Installation 13 2.1 Prerequisites............................................. 13 2.2 Download............................................... 13 2.3 Unpack................................................ 14 2.4 Configure and Build......................................... 14 2.5 Building the Manual......................................... 14 2.6 Test.................................................. 15 2.7 Use.................................................. 16 2.8 Report Bugs............................................. 16 2.9 Contribute.............................................. 16 3 Tutorial 19 3.1 The State Transition Diagram.................................... 19 3.2 Elements of the State Notation Language.............................. 19 3.3 A Complete State Program...................................... 20 3.4 Adding a
    [Show full text]
  • A Rapid, Sensitive, Scalable Method for Precision Run-On Sequencing
    bioRxiv preprint doi: https://doi.org/10.1101/2020.05.18.102277; this version posted May 19, 2020. The copyright holder for this preprint (which was not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available under aCC-BY 4.0 International license. 1 A rapid, sensitive, scalable method for 2 Precision Run-On sequencing (PRO-seq) 3 4 Julius Judd1*, Luke A. Wojenski2*, Lauren M. Wainman2*, Nathaniel D. Tippens1, Edward J. 5 Rice3, Alexis Dziubek1,2, Geno J. Villafano2, Erin M. Wissink1, Philip Versluis1, Lina Bagepalli1, 6 Sagar R. Shah1, Dig B. Mahat1#a, Jacob M. Tome1#b, Charles G. Danko3,4, John T. Lis1†, 7 Leighton J. Core2† 8 9 *Equal contribution 10 1Department of Molecular Biology and Genetics, Cornell University, Ithaca, NY 14853, USA 11 2Department of Molecular and Cell Biology, Institute of Systems Genomics, University of 12 Connecticut, Storrs, CT 06269, USA 13 3Baker Institute for Animal Health, College of Veterinary Medicine, Cornell University, Ithaca, 14 NY 14853, USA 15 4Department of Biomedical Sciences, College of Veterinary Medicine, Cornell University, 16 Ithaca, NY 14853, USA 17 #aPresent address: Koch Institute for Integrative Cancer Research, Massachusetts Institute of 18 Technology, Cambridge, MA 02139, USA 19 #bPresent address: Department of Genome Sciences, University of Washington, Seattle, WA, 20 USA 21 †Correspondence to: [email protected] or [email protected] 22 1 bioRxiv preprint doi: https://doi.org/10.1101/2020.05.18.102277; this version posted May 19, 2020. The copyright holder for this preprint (which was not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity.
    [Show full text]
  • Specification of the "Sequ" Command
    1 Specification of the "sequ" command 2 Copyright © 2013 Bart Massey 3 Revision 0, 1 October 2013 4 This specification describes the "universal sequence" command sequ. The sequ command is a 5 backward-compatible set of extensions to the UNIX [seq] 6 (http://www.gnu.org/software/coreutils/manual/html_node/seq-invo 7 cation.html) command. There are many implementations of seq out there: this 8 specification is built on the seq supplied with GNU Coreutils version 8.21. 9 The seq command emits a monotonically increasing sequence of numbers. It is most commonly 10 used in shell scripting: 11 TOTAL=0 12 for i in `seq 1 10` 13 do 14 TOTAL=`expr $i + $TOTAL` 15 done 16 echo $TOTAL 17 prints 55 on standard output. The full sequ command does this basic counting operation, plus 18 much more. 19 This specification of sequ is in several stages, known as compliance levels. Each compliance 20 level adds required functionality to the sequ specification. Level 1 compliance is equivalent to 21 the Coreutils seq command. 22 The usual specification language applies to this document: MAY, SHOULD, MUST (and their 23 negations) are used in the standard fashion. 24 Wherever the specification indicates an error, a conforming sequ implementation MUST 25 immediately issue appropriate error message specific to the problem. The implementation then 26 MUST exit, with a status indicating failure to the invoking process or system. On UNIX systems, 27 the error MUST be indicated by exiting with status code 1. 28 When a conforming sequ implementation successfully completes its output, it MUST 29 immediately exit, with a status indicating success to the invoking process or systems.
    [Show full text]
  • Transcriptome-Wide M a Detection with DART-Seq
    Transcriptome-wide m6A detection with DART-Seq Kate D. Meyer ( [email protected] ) Duke University School of Medicine https://orcid.org/0000-0001-7197-4054 Method Article Keywords: RNA, epitranscriptome, RNA methylation, m6A, methyladenosine, DART-Seq Posted Date: September 23rd, 2019 DOI: https://doi.org/10.21203/rs.2.12189/v1 License: This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License Page 1/7 Abstract m6A is the most abundant internal mRNA modication and plays diverse roles in gene expression regulation. Much of our current knowledge about m6A has been driven by recent advances in the ability to detect this mark transcriptome-wide. Antibody-based approaches have been the method of choice for global m6A mapping studies. These methods rely on m6A antibodies to immunoprecipitate methylated RNAs, followed by next-generation sequencing to identify m6A-containing transcripts1,2. While these methods enabled the rst identication of m6A sites transcriptome-wide and have dramatically improved our ability to study m6A, they suffer from several limitations. These include requirements for high amounts of input RNA, costly and time-consuming library preparation, high variability across studies, and m6A antibody cross-reactivity with other modications. Here, we describe DART-Seq (deamination adjacent to RNA modication targets), an antibody-free method for global m6A detection. In DART-Seq, the C to U deaminating enzyme, APOBEC1, is fused to the m6A-binding YTH domain. This fusion protein is then introduced to cellular RNA either through overexpression in cells or with in vitro assays, and subsequent deamination of m6A-adjacent cytidines is then detected by RNA sequencing to identify m6A sites.
    [Show full text]
  • Introduction to Shell Programming Using Bash Part I
    Introduction to shell programming using bash Part I Deniz Savas and Michael Griffiths 2005-2011 Corporate Information and Computing Services The University of Sheffield Email [email protected] [email protected] Presentation Outline • Introduction • Why use shell programs • Basics of shell programming • Using variables and parameters • User Input during shell script execution • Arithmetical operations on shell variables • Aliases • Debugging shell scripts • References Introduction • What is ‘shell’ ? • Why write shell programs? • Types of shell What is ‘shell’ ? • Provides an Interface to the UNIX Operating System • It is a command interpreter – Built on top of the kernel – Enables users to run services provided by the UNIX OS • In its simplest form a series of commands in a file is a shell program that saves having to retype commands to perform common tasks. • Shell provides a secure interface between the user and the ‘kernel’ of the operating system. Why write shell programs? • Run tasks customised for different systems. Variety of environment variables such as the operating system version and type can be detected within a script and necessary action taken to enable correct operation of a program. • Create the primary user interface for a variety of programming tasks. For example- to start up a package with a selection of options. • Write programs for controlling the routinely performed jobs run on a system. For example- to take backups when the system is idle. • Write job scripts for submission to a job-scheduler such as the sun- grid-engine. For example- to run your own programs in batch mode. Types of Unix shells • sh Bourne Shell (Original Shell) (Steven Bourne of AT&T) • csh C-Shell (C-like Syntax)(Bill Joy of Univ.
    [Show full text]
  • MEDIPS: Genome-Wide Differential Coverage Analysis of Sequencing Data Derived from DNA Enrichment Experiments
    MEDIPS: genome-wide differential coverage analysis of sequencing data derived from DNA enrichment experiments. 1 Lukas Chavez [email protected] May 19, 2021 Contents 1 Introduction ..............................2 2 Installation ...............................2 3 Preparations..............................3 4 Case study: Genome wide methylation and differential cover- age between two conditions .....................5 4.1 Data Import and Preprocessing ..................5 4.2 Coverage, methylation profiles and differential coverage ......6 4.3 Differential coverage: selecting significant windows ........8 4.4 Merging neighboring significant windows .............9 4.5 Extracting data at regions of interest ...............9 5 Quality controls ............................ 10 5.1 Saturation analysis ........................ 10 5.2 Correlation between samples ................... 12 5.3 Sequence Pattern Coverage ................... 13 5.4 CpG Enrichment ......................... 14 6 Miscellaneous............................. 14 6.1 Processing regions of interest ................... 15 6.2 Export Wiggle Files ........................ 15 6.3 Merging MEDIPS SETs ...................... 15 6.4 Annotation of significant windows ................. 16 6.5 addCNV ............................. 16 6.6 Calibration Plot .......................... 16 6.7 Comments on the experimental design and Input data ....... 17 MEDIPS 1 Introduction MEDIPS was developed for analyzing data derived from methylated DNA immunoprecipita- tion (MeDIP) experiments [1] followed by
    [Show full text]
  • MEDIPS: DNA IP-Seq Data Analysis
    Package ‘MEDIPS’ September 30, 2021 Type Package Title DNA IP-seq data analysis Version 1.44.0 Date 2020-02-15 Author Lukas Chavez, Matthias Lienhard, Joern Dietrich, Isaac Lopez Moyado Maintainer Lukas Chavez <[email protected]> Description MEDIPS was developed for analyzing data derived from methylated DNA immunoprecipitation (MeDIP) experiments followed by sequencing (MeDIP- seq). However, MEDIPS provides functionalities for the analysis of any kind of quantitative sequencing data (e.g. ChIP-seq, MBD-seq, CMS-seq and others) including calculation of differential coverage between groups of samples and saturation and correlation analysis. License GPL (>=2) LazyLoad yes Depends R (>= 3.0), BSgenome, Rsamtools Imports GenomicRanges, Biostrings, graphics, gtools, IRanges, methods, stats, utils, edgeR, DNAcopy, biomaRt, rtracklayer, preprocessCore Suggests BSgenome.Hsapiens.UCSC.hg19, MEDIPSData, BiocStyle biocViews DNAMethylation, CpGIsland, DifferentialExpression, Sequencing, ChIPSeq, Preprocessing, QualityControl, Visualization, Microarray, Genetics, Coverage, GenomeAnnotation, CopyNumberVariation, SequenceMatching NeedsCompilation no git_url https://git.bioconductor.org/packages/MEDIPS git_branch RELEASE_3_13 git_last_commit 4df0aee git_last_commit_date 2021-05-19 Date/Publication 2021-09-30 1 2 MEDIPS-package R topics documented: MEDIPS-package . .2 COUPLINGset-class . .3 MEDIPS.addCNV . .4 MEDIPS.correlation . .5 MEDIPS.couplingVector . .6 MEDIPS.CpGenrich . .7 MEDIPS.createROIset . .8 MEDIPS.createSet . 10 MEDIPS.exportWIG . 11
    [Show full text]
  • Gnu Coreutils Core GNU Utilities for Version 5.93, 2 November 2005
    gnu Coreutils Core GNU utilities for version 5.93, 2 November 2005 David MacKenzie et al. This manual documents version 5.93 of the gnu core utilities, including the standard pro- grams for text and file manipulation. Copyright c 1994, 1995, 1996, 2000, 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. Chapter 1: Introduction 1 1 Introduction This manual is a work in progress: many sections make no attempt to explain basic concepts in a way suitable for novices. Thus, if you are interested, please get involved in improving this manual. The entire gnu community will benefit. The gnu utilities documented here are mostly compatible with the POSIX standard. Please report bugs to [email protected]. Remember to include the version number, machine architecture, input files, and any other information needed to reproduce the bug: your input, what you expected, what you got, and why it is wrong. Diffs are welcome, but please include a description of the problem as well, since this is sometimes difficult to infer. See section “Bugs” in Using and Porting GNU CC. This manual was originally derived from the Unix man pages in the distributions, which were written by David MacKenzie and updated by Jim Meyering.
    [Show full text]
  • Systems Supplement for COP 3601
    Systems Guide for COP 3601: Introduction to Systems Software Charles N. Winton Department of Computer and Information Sciences University of North Florida 2010 Chapter 1 A Basic Guide for the Unix Operating System 1. 1 Using the Unix On-line Manual Pages Facility The following are some of the Unix commands for which you may display manual pages: cal cat cd chmod cp cut date echo egrep ex fgrep file find gcc gdb grep kill less ln locate ls mail make man mesg mkdir mv nohup nl passwd pr ps pwd rm rmdir set sleep sort stty tail tee time touch tr tty uname umask unset vim wall wc which who whoami write For example, to display the manual pages for the command "cp" enter man cp Note that you may also enter man man to find out more about the "man" command. In addition there may be commands unique to the local environment with manual pages; e.g., man turnin accesses a manual page for a project submission utility named Aturnin@ that has been added to the system. If you enter a command from the Unix prompt that requires an argument, the system will recognize that the command is incomplete and respond with an error message. For example, if the command "cp" had been entered at the Unix prompt the system would respond with the information such as shown below: cp: missing file arguments Try `cp --help' for more information. The "cp" command is a copy command. If the arguments which tell the command which file to copy and where to locate the copied file are missing, then the usage error message is generated.
    [Show full text]
  • Command Line Unix BLAST, RM, Herne
    Command Line Unix BLAST, RM, Herne Christopher Shaffer Genomics Education Workshop Washington University, Summer ‘06 Command line • Why use BLAST command line? – Avoid slow responses at NCBI – Use a static database, so answers does not change – Search unpublished data (search all fosmids) • Finishing • Level 3 Annotation 1 Building a BLAST command >blastall -p blastx Search Type -i 99M21.seq Query -d ../../../Databases/protein/melanogaster Database -o dmel_blastx.html Output -T -e 1e-2 -F F Settings Goals • Unix directories & command line • BLAST (via command line) • RepeatMasker (via command line) • herne (blast visualization) 2 General Unix Tips • To use the command line start X11 and type commands into the “xterm” window • A few things about unix commands: – UNIX is case sensitive – Little or no feedback if successful, “no news is good news” Unix Help on the Web Here is a list of a few online Unix tutorials: • Unix for Beginners http://www.ee.surrey.ac.uk/Teaching/Unix/ • Unix Guru Universe http://www.ugu.com/sui/ugu/show?help.beginners • Getting Started With The Unix Operating System http://www.leeds.ac.uk/iss/documentation/beg/beg8/beg8.html 3 Unix directories • Unix systems can have many thousands of files • Directories are a means of organizing your files on a Unix computer. – They are equivalent to folders in Windows and Macintosh computers Directory Structure The directory that holds / everything is called “root”and is symbolized by “/” Applications Users System Administrator Student4342 Shared Documents Music Desktop 4 Unix directories (cont) • When logged into a unix computer there is always one directory called the “current working directory” • When you type a command with a filename unix will look for that file in the “current working directory” • You can change the “current working directory” at any time with the cd command.
    [Show full text]
  • Disentangling Srna-Seq Data to Study RNA Communication Between Species
    bioRxiv preprint doi: https://doi.org/10.1101/508937; this version posted January 2, 2019. The copyright holder for this preprint (which was not certified by peer review) is the author/funder. All rights reserved. No reuse allowed without permission. Disentangling sRNA-Seq data to study RNA communication between species 1 1 2,§ 2 Bermúdez-Barrientos JR *,​ Ramírez-Sánchez O *,​ Chow FWN ,​ Buck AH **,​ Abreu-Goodger 1 ​ ​ ​ ​ C **​ ​ 1 Unidad​ de Genómica Avanzada (Langebio), Centro de Investigación y de Estudios Avanzados del IPN, Irapuato, Guanajuato 36824, México 2 Institute​ of Immunology and Infection Research and Centre for Immunity, Infection & Evolution, School of Biological Sciences, The University of Edinburgh, Edinburgh EH9 3JT, UK § Current​ Address: Department of Microbiology, Li Ka Shing Faculty of Medicine, The University of Hong Kong, Pokfulam, Hong Kong * these authors contributed equally ** to whom correspondence should be addressed: [email protected], [email protected] ​ ​ ​ KEYWORDS Small RNA, extracellular RNA, RNA communication, symbiosis, extracellular vesicles, dual RNA-Seq, sRNA-Seq ABSTRACT Many organisms exchange small RNAs during their interactions, and these RNAs can target or bolster defense strategies in host-pathogen systems. Current sRNA-Seq technology can determine the small RNAs present in any symbiotic system, but there are very few bioinformatic tools available to interpret the results. We show that one of the biggest challenges comes from sequences that map equally well to the genomes of both interacting organisms. This arises due to the small size of the sRNA compared to large genomes, and because many of the produced sRNAs come from genomic regions that encode highly conserved miRNAs, rRNAs or tRNAs.
    [Show full text]
  • SAMMY-Seq Reveals Early Alteration of Heterochromatin and Deregulation of Bivalent Genes in Hutchinson-Gilford Progeria Syndrome
    ARTICLE https://doi.org/10.1038/s41467-020-20048-9 OPEN SAMMY-seq reveals early alteration of heterochromatin and deregulation of bivalent genes in Hutchinson-Gilford Progeria Syndrome Endre Sebestyén 1,8,9, Fabrizia Marullo 2,9, Federica Lucini 3, Cristiano Petrini1, Andrea Bianchi2,4, Sara Valsoni 4,5, Ilaria Olivieri 2, Laura Antonelli 5, Francesco Gregoretti 5, Gennaro Oliva5, ✉ ✉ Francesco Ferrari 1,6,10 & Chiara Lanzuolo 3,7,10 1234567890():,; Hutchinson-Gilford progeria syndrome is a genetic disease caused by an aberrant form of Lamin A resulting in chromatin structure disruption, in particular by interfering with lamina associated domains. Early molecular alterations involved in chromatin remodeling have not been identified thus far. Here, we present SAMMY-seq, a high-throughput sequencing-based method for genome-wide characterization of heterochromatin dynamics. Using SAMMY-seq, we detect early stage alterations of heterochromatin structure in progeria primary fibroblasts. These structural changes do not disrupt the distribution of H3K9me3 in early passage cells, thus suggesting that chromatin rearrangements precede H3K9me3 alterations described at later passages. On the other hand, we observe an interplay between changes in chromatin accessibility and Polycomb regulation, with site-specific H3K27me3 variations and tran- scriptional dysregulation of bivalent genes. We conclude that the correct assembly of lamina associated domains is functionally connected to the Polycomb repression and rapidly lost in early molecular events of progeria pathogenesis. 1 IFOM, The FIRC Institute of Molecular Oncology, Milan, Italy. 2 Institute of Cell Biology and Neurobiology, National Research Council, Rome, Italy. 3 Istituto Nazionale Genetica Molecolare “Romeo ed Enrica Invernizzi”, Milan, Italy.
    [Show full text]